Russell Fairweather

Russell Fairweather

Cybersecurity Consultant
Russell Fairweather is a versatile tech enthusiast whose expertise spans IT security, development, and networking. With a deep understanding of software development principles and networking protocols, Russell crafts content that offers invaluable insights and actionable advice. Trusted by professionals seeking to elevate their coding skills and reinforce network infrastructure, Russell is a resource for tech leaders navigating the ever-evolving shifts in technology.
ServiceNow Acquires Veza to Boost Identity Security Solutions
Identity & Access Management ServiceNow Acquires Veza to Boost Identity Security Solutions

Imagine a world where every click, every login, and every automated process in an enterprise could either be a gateway to innovation or a backdoor for a devastating cyberattack. With businesses increasingly leaning on cloud platforms, SaaS tools, and AI agents, the stakes for securing access to

How Does HTB AI Range Boost Cybersecurity with AI and Humans?
Data Protection & Privacy How Does HTB AI Range Boost Cybersecurity with AI and Humans?

As cybersecurity threats evolve with the integration of artificial intelligence, few are better positioned to shed light on this frontier than Rupert Marais, our in-house security specialist. With deep expertise in endpoint and device security, cybersecurity strategies, and network management,

Coyote and Maverick Trojans Target Brazilian WhatsApp Users
Endpoint & Device Security Coyote and Maverick Trojans Target Brazilian WhatsApp Users

Imagine logging into a widely trusted messaging app, receiving a seemingly innocent file from a familiar contact, and unknowingly unleashing a devastating cyberattack on your finances. This scenario is becoming a harsh reality for millions of WhatsApp users in Brazil, where two sophisticated

Google Antigravity Error Deletes User Data, Sparks AI Concerns
Infrastructure & Network Security Google Antigravity Error Deletes User Data, Sparks AI Concerns

Imagine logging into a cutting-edge AI platform to tinker with a personal project, only to watch in horror as it wipes out an entire drive of precious data without so much as a warning. This isn’t the plot of a sci-fi thriller but the real-life experience of a photographer and graphic designer from

How Did SmartTube's Security Breach Affect Android TV Users?
Data Protection & Privacy How Did SmartTube's Security Breach Affect Android TV Users?

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with a wealth of experience in endpoint and device security, cybersecurity strategies, and network management. Today, we're diving into the recent SmartTube breach—a significant incident that compromised a popular

How Is Tomiris Evolving Cyber-Espionage Tactics in 2025?
Security Operations & Management How Is Tomiris Evolving Cyber-Espionage Tactics in 2025?

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with a wealth of experience in endpoint and device security, cybersecurity strategies, and network management. With a career dedicated to dissecting advanced persistent threats and fortifying digital defenses, Rupert has

How Did ShadyPanda Turn Browser Extensions Into Spyware?
Malware & Threats How Did ShadyPanda Turn Browser Extensions Into Spyware?

Imagine installing a simple browser extension to jazz up your desktop with wallpapers, only to discover later that it’s been secretly tracking every click, search, and scroll. This isn’t a far-fetched nightmare but the reality for over 4.3 million users affected by a covert cyber threat known as

Agentic Browser Security – Review
Endpoint & Device Security Agentic Browser Security – Review

In a browser where autonomous agents plan, click, and ship messages in seconds, a single hidden instruction can turn a helpful assistant into a quiet saboteur before anyone notices. That tension defined the debut of agent-enabled browsing, with OpenAI’s ChatGPT Atlas standing front and center as a

How Does APT31 Use Cloud Services for Stealthy Cyberattacks?
Infrastructure & Network Security How Does APT31 Use Cloud Services for Stealthy Cyberattacks?

In the shadowy realm of cyber espionage, few groups have demonstrated the cunning and persistence of APT31, a China-linked advanced persistent threat actor known for targeting high-value sectors across the globe. Recent reports have shed light on their sophisticated operations against the Russian

Is Dropping Elephant Hiding a Python Backdoor in Pakistan?
Endpoint & Device Security Is Dropping Elephant Hiding a Python Backdoor in Pakistan?

Rupert Marais has spent years in the trenches of endpoint defense and Windows tradecraft, and he brings a practitioner’s eye to an operation that blends social engineering with living-off-the-land persistence. In this conversation with Russell Fairweather, he traces Dropping Elephant’s multi-stage

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later